Visible to the public Efficient Authentication and Key Management Mechanisms for Smart Grid Communications

TitleEfficient Authentication and Key Management Mechanisms for Smart Grid Communications
Publication TypeJournal Article
Year of Publication2014
AuthorsNicanfar, H., Jokar, P., Beznosov, K., Leung, V.C.M.
JournalSystems Journal, IEEE
Volume8
Pagination629-640
Date PublishedJune
ISSN1932-8184
Keywordsauthentication, authentication server, authorisation, cryptographic protocols, Enhanced identity-based cryptography (EIBC), home area network, home networks, identity-based cryptography, initial password, key generator entity, Key Management, key management protocol, management overhead, mutual authentication, Protocols, Public key, public key cryptography, public key infrastructure, public-private key pairs, secure remote password (SRP), secure remote password protocol, security, Servers, smart grid (SG), smart grid communications, smart meter (SM), smart power grids, Synthetic aperture sonar
Abstract

A smart grid (SG) consists of many subsystems and networks, all working together as a system of systems, many of which are vulnerable and can be attacked remotely. Therefore, security has been identified as one of the most challenging topics in SG development, and designing a mutual authentication scheme and a key management protocol is the first important step. This paper proposes an efficient scheme that mutually authenticates a smart meter of a home area network and an authentication server in SG by utilizing an initial password, by decreasing the number of steps in the secure remote password protocol from five to three and the number of exchanged packets from four to three. Furthermore, we propose an efficient key management protocol based on our enhanced identity-based cryptography for secure SG communications using the public key infrastructure. Our proposed mechanisms are capable of preventing various attacks while reducing the management overhead. The improved efficiency for key management is realized by periodically refreshing all public/private key pairs as well as any multicast keys in all the nodes using only one newly generated function broadcasted by the key generator entity. Security and performance analyses are presented to demonstrate these desirable attributes.

URLhttp://ieeexplore.ieee.org/document/6553352/
DOI10.1109/JSYST.2013.2260942
Citation Key6553352